home.social

#finfishercom — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #finfishercom, aggregated by home.social.

  1. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on IPs LARGE LIST

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on these IPs LARGE LIST hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    40.115.118.6

    ²
    40.115.117.30

    ³ (fast .ly)
    151.101.41.184


    172.56.140.14


    173.194.166.106


    173.194.166.106


    199.232.92.157

    ⁸ Twitter
    104.244.42.66


    151.101.190.110

    ¹⁰
    138.91.55.166

    ¹¹
    192.229.173.16

    ¹² Twitter
    104.244.42.139

    ¹³
    173.194.166.171

    ¹⁴
    152.199.24.185

    ¹⁵
    165.254.198.210

    ¹⁶ Fast .ly
    151.101.42.2

    ¹⁷ Twitter
    104.244.42.70

    ¹⁸ Fast .ly
    151.101.40.193

    ¹⁹ Twitter
    104.244.42.134

    ²⁰ Fast .ly
    151.101.40.84

    ²¹
    216.239.34.117

    ²²
    104.26.2.192

    ²³
    104.26.3.192

    ²⁴
    172.67.72.251

    ²⁵
    redirect.redhat.com

    ²⁶
    192.229.210.163

    ²⁷
    172.67.28.154

    ²⁸
    104.18.10.19

    ²⁹
    104.244.42.69

    ³⁰
    944ellb0102-vip01.blackmesh.com

    ³¹
    151.101.41.67

    ³² Fast .ly
    151.101.40.81

    ³³
    104.26.10.153

    ³⁴
    151.101.41.188

    ³⁵
    104.26.13.149

    ³⁶
    104.26.12.149

    ³⁷
    63.241.199.113

    ³⁸ Local ISP exploit try ip (private)
    192.0.66.2

    ³⁹
    162.159.153.4

    ⁴⁰
    104.18.16.202

    ⁴¹
    104.26.3.29

    ⁴²
    104.26.2.29

    ⁴³ NYC Twitter
    72.21.91.70

    ⁴⁴ Fast .ly
    151.101.2.187

    ⁴⁵ Fast .ly
    151.101.66.187

    ⁴⁶
    13.86.218.255

    ⁴⁷
    209.234.235.188

    ⁴⁸
    104.26.15.185

    ⁴⁹
    172.67.69.125

    ⁵⁰
    52.239.139.228

    ⁵¹
    104.17.83.11

    ⁵²
    104.17.32.62

    ⁵³
    104.244.42.130

    ⁵⁴
    20.189.172.0

    ⁵⁵
    172.67.222.28

    ⁵⁶
    151.101.41.73

    ⁵⁷
    13.86.218.248

    ⁵⁸
    104.27.203.89

    ⁵⁹
    104.16.13.194

    ⁶⁰
    104.244.42.133

    ⁶¹
    151.101.130.132

    ⁶²
    172.67.73.80

    ⁶³
    104.26.6.15

    ⁶⁴
    104.22.33.123

    ⁶⁵
    dns11.quad9.net

    ⁶⁶
    104.244.42.198

    ⁶⁷
    104.244.42.2

    ⁶⁸
    104.244.43.131

    ⁶⁹
    208.54.152.122

    ⁷⁰
    208.54.150.98

    ⁷¹
    52.236.40.36

    ⁷²
    104.18.23.15

    ⁷³
    104.26.1.5

    ⁷⁴
    172.67.71.43

    ⁷⁵
    199.232.93.184

    ⁷⁶
    151.101.2.217

    ⁷⁷
    199.232.92.81

    ⁷⁸
    104.26.0.5

    ⁷⁹
    151.101.130.217

    ⁸⁰
    151.101.66.217

    ⁸¹
    104.26.6.18

    ⁸²
    104.18.22.15

    ⁸³
    104.26.7.18

    ⁸⁴
    104.21.78.132

    ⁸⁵
    104.244.42.6

    ⁸⁶
    199.232.92.200

    ⁸⁷
    20.60.40.36

    ⁸⁸
    52.245.40.74

    ⁸⁹
    104.244.42.194

    ⁹⁰
    199.232.94.110

    ⁹¹
    172.67.72.57

    ⁹²
    192.229.173.16

    ⁹³
    104.244.42.193

    ⁹⁴
    208.54.106.98

    ⁹⁵
    104.244.42.65

    ⁹⁶
    104.244.42.193

    ⁹⁷
    151.101.67.52

    ⁹⁸
    104.244.42.3

    ⁹⁹
    151.101.67.52

    ¹⁰⁰
    104.244.42.1

    ¹⁰¹
    192.229.173.16

    ¹⁰²
    151.101.40.159

    ¹⁰³
    104.244.42.11

    ¹⁰⁴
    152.199.24.185

    ¹⁰⁵
    152.199.24.185

    This is just # attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  2. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #CloudFront
  3. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #akamai

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #akamai hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    a23-2-76-180.deploy.static.akamaitechnologies.com

    ²
    a96-7-153-84.deploy.static.akamaitechnologies.com

    ³
    a104-86-4-102.deploy.static.akamaitechnologies.com


    a184-31-10-236.deploy.static.akamaitechnologies.com


    a96-6-226-157.deploy.static.akamaitechnologies.com


    a23-50-34-13.deploy.static.akamaitechnologies.com


    a23-15-137-146.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com


    a23-213-123-78.deploy.static.akamaitechnologies.com

    ¹⁰
    a23-11-22-101.deploy.static.akamaitechnologies.com

    ¹¹
    a23-59-206-230.deploy.static.akamaitechnologies.com

    ¹²
    a104-125-55-184.deploy.static.akamaitechnologies.com

    ¹³
    a23-78-154-233.deploy.static.akamaitechnologies.com

    ¹⁴
    a23-7-132-30.deploy.static.akamaitechnologies.com

    ¹⁵
    a104-86-104-224.deploy.static.akamaitechnologies.com

    ¹⁶
    a104-122-42-39.deploy.static.akamaitechnologies.com

    ¹⁷
    a23-202-60-225.deploy.static.akamaitechnologies.com

    ¹⁸
    a104-86-184-250.deploy.static.akamaitechnologies.com

    ¹⁹
    a184-51-48-250.deploy.static.akamaitechnologies.com

    ²⁰
    a104-121-159-217.deploy.static.akamaitechnologies.com

    ²¹
    a104-121-159-225.deploy.static.akamaitechnologies.com

    ²²
    a104-84-227-133.deploy.static.akamaitechnologies.com

    ²³
    a23-42-151-231.deploy.static.akamaitechnologies.com

    ²⁴
    a23-40-167-73.deploy.static.akamaitechnologies.com

    ²⁵
    a23-223-16-122.deploy.static.akamaitechnologies.com

    ²⁶
    a184-31-10-237.deploy.static.akamaitechnologies.com

    ²⁷
    a23-48-32-80.deploy.static.akamaitechnologies.com

    ²⁸
    a23-48-32-75.deploy.static.akamaitechnologies.com

    ²⁹
    a173-222-162-31.deploy.static.akamaitechnologies.com

    ³⁰
    a23-45-32-210.deploy.static.akamaitechnologies.com

    ³¹
    a184-30-164-84.deploy.static.akamaitechnologies.com

    ³²
    a23-59-200-173.deploy.static.akamaitechnologies.com

    ³³
    a23-43-191-224.deploy.static.akamaitechnologies.com

    This is just #akamai attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  4. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #Google

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER on #Google hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    sfo07s13-in-f174.1e100.net

    ²
    159.240.178.107.bc.googleusercontent.com

    ³
    25.25.190.35.bc.googleusercontent.com


    51.241.186.35.bc.googleusercontent.com


    183.34.211.130.bc.googleusercontent.com


    173.194.166.198


    74.125.166.169


    173.194.166.106


    173.194.167.9

    ¹⁰
    142.250.138.97

    ¹¹
    142.250.138.95

    ¹²
    142.250.138.94

    ¹³
    142.250.114.97

    ¹⁴
    142.250.138.100

    ¹⁵
    142.250.138.101

    ¹⁶
    142.250.138.138

    ¹⁷
    142.250.138.139

    ¹⁸
    142.250.138.113

    ¹⁹
    142.250.114.95

    ²⁰
    142.250.138.102

    ²¹
    sfo07s16-in-f78.1e100.net

    ²²
    dns.google

    ²³
    74.125.20.94

    ²⁴
    142.250.101.188

    ²⁵
    172.253.112.188

    ²⁶
    238.105.188.35.bc.googleusercontent.com

    ²⁷
    sfo03s26-in-f10.1e100.net

    ²⁷
    sfo03s25-in-f10.1e100.net

    ²⁸
    sfo03s24-in-f10.1e100.net

    ²⁹
    nuq04s45-in-f10.1e100.net

    ³⁰
    sfo03s27-in-f10.1e100.net

    ³¹
    sfo03s21-in-f10.1e100.net

    ³²
    nuq04s42-in-f10.1e100.net

    ³³
    nuq04s39-in-f10.1e100.net

    ³⁴
    sfo03s18-in-f10.1e100.net

    ³⁵
    142.250.176.10

    ³⁶
    lax17s50-in-f3.1e100.net

    ³⁷
    sfo03s33-in-f10.1e100.net

    ³⁸
    142.251.46.163

    This is just #Google attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  5. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #AWS

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #AMER & #EU on #AWS hosting since November 2022ish for #Prosecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com

    ²
    ec2-52-42-61-176.us-west-2.compute.amazonaws.com

    ³
    ec2-52-25-170-148.us-west-2.compute.amazonaws.com


    ec2-44-236-58-13.us-west-2.compute.amazonaws.com


    ec2-44-240-164-68.us-west-2.compute.amazonaws.com


    ec2-52-41-118-210.us-west-2.compute.amazonaws.com


    ec2-52-35-177-24.us-west-2.compute.amazonaws.com


    35.82.205.248


    ec2-54-191-45-53.us-west-2.compute.amazonaws.com

    ¹⁰
    ec2-44-241-110-131.us-west-2.compute.amazonaws.com

    ¹¹
    ec2-35-82-235-74.us-west-2.compute.amazonaws.com

    ¹²
    ec2-54-68-18-200.us-west-2.compute.amazonaws.com

    ¹³
    ec2-54-184-79-208.us-west-2.compute.amazonaws.com

    ¹⁴
    ec2-52-10-247-144.us-west-2.compute.amazonaws.com

    ¹⁵
    ec2-54-186-72-30.us-west-2.compute.amazonaws.com

    ¹⁶
    ec2-13-234-145-166.ap-south-1.compute.amazonaws.com

    ¹⁷
    ec2-52-21-175-83.compute-1.amazonaws.com

    ¹⁸
    ec2-44-229-72-171.us-west-2.compute.amazonaws.com

    ¹⁹
    ec2-44-230-23-250.us-west-2.compute.amazonaws.com

    ²⁰
    ec2-52-20-36-26.compute-1.amazonaws.com

    ²¹
    ec2-52-204-216-203.compute-1.amazonaws.com

    ²²
    ec2-13-235-220-86.ap-south-1.compute.amazonaws.com

    ²³
    ec2-18-235-29-229.compute-1.amazonaws.com

    ²⁴
    ec2-15-207-179-172.ap-south-1.compute.amazonaws.com

    ²⁵
    ec2-176-34-188-147.eu-west-1.compute.amazonaws.com

    ²⁶
    ec2-176-34-188-143.eu-west-1.compute.amazonaws.com

    ²⁷
    ec2-18-218-105-211.us-east-2.compute.amazonaws.com

    ²⁸
    ec2-3-21-177-140.us-east-2.compute.amazonaws.com

    ²⁹
    ec2-34-205-198-58.compute-1.amazonaws.com

    ³⁰
    ec2-3-20-61-88.us-east-2.compute.amazonaws.com

    ³¹
    ec2-13-59-255-164.us-east-2.compute.amazonaws.com

    ³²
    ec2-3-221-252-182.compute-1.amazonaws.com

    ³³
    ec2-54-236-219-191.compute-1.amazonaws.com

    ³⁴
    ec2-18-156-155-177.eu-central-1.compute.amazonaws.com

    ³⁵
    ec2-34-212-53-52.us-west-2.compute.amazonaws.com

    ³⁶
    ec2-54-246-112-81.eu-west-1.compute.amazonaws.com

    ³⁷
    ec2-54-217-236-154.eu-west-1.compute.amazonaws.com

    ³⁸
    ec2-46-137-158-3.eu-west-1.compute.amazonaws.com

    ³⁹
    ec2-176-34-105-145.eu-west-1.compute.amazonaws.com

    ⁴⁰
    ec2-52-0-252-134.compute-1.amazonaws.com

    ⁴¹
    ec2-176-34-123-171.eu-west-1.compute.amazonaws.com

    ⁴²
    ec2-54-228-232-250.eu-west-1.compute.amazonaws.com

    ⁴³
    ec2-54-217-245-217.eu-west-1.compute.amazonaws.com

    ⁴⁴
    ec2-52-0-252-1.compute-1.amazonaws.com

    ⁴⁵
    ec2-52-0-252-3.compute-1.amazonaws.com

    ⁴⁶
    ec2-52-0-252-2.compute-1.amazonaws.com

    ⁴⁷
    ec2-54-246-123-138.eu-west-1.compute.amazonaws.com

    ⁴⁸
    ec2-54-191-65-148.us-west-2.compute.amazonaws.com

    This is just #AWS attaccc nodes for the past two years I have logged as #FinFisher shims/proxies/nodes. Every single one of these tried a MITM attaccc & multiple other OTS exploits. They were blocked and logged.

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware

  6. CW: #GammaGroup #FinFisher #FinSpy #SystemApp callback list of hosts / shims on #BunnyNet via #DataPacket

    Historical list of #SystemApp callback to #FinFisher clients logged while on #InfoseceXchange that's good for #tcpdump correlation #investigations in #Germany on the CDN #DataPacket hosting the #BunnyNet since November 2022ish for #GermanProsecutors to correlate.

    #FinFisherCom🤝#EnemyOfTheInternet

    #CALEA #greymarket #CALEAmalware 🔍🧐#infosec

    ¹
    143-244-49-183.bunnyinfra.net

    ²
    143-244-50-83.bunnyinfra.net

    ³
    169.150.221.147


    143-244-50-88.bunnyinfra.net


    143-244-50-211.bunnyinfra.net


    169-150-249-163.bunnyinfra.net


    169-150-221-147.bunnyinfra.net


    143-244-50-82.bunnyinfra.net


    143-244-50-213.bunnyinfra.net

    ¹⁰
    143-244-50-209.bunnyinfra.net

    ¹¹
    143-244-49-180.bunnyinfra.net

    ¹²
    143.244.50.214

    ¹³
    185-93-1-251.bunnyinfra.net

    ¹⁴
    unn-169-150-249-163.datapacket.com

    ¹⁵
    unn-169-150-249-165.datapacket.com

    ¹⁶
    unn-169-150-249-164.datapacket.com

    ¹⁷
    unn-169-150-249-166.datapacket.com

    Cities:
    ¹
    reddit.com/r/netzpolitik/comme

    ²
    en.wikipedia.org/wiki/FinFishe

    ³
    spiegel.de/netzwelt/netzpoliti


    netzpolitik.org/2022/nach-pfae


    securityweek.com/german-author


    bloomberg.com/news/articles/20

    #RTDNA #StateSponsoredMalware#SSM#malware